EP2741214A1 - Système de mémorisation de données et procédé pour l'interaction d'informations de sécurité - Google Patents

Système de mémorisation de données et procédé pour l'interaction d'informations de sécurité Download PDF

Info

Publication number
EP2741214A1
EP2741214A1 EP12820499.7A EP12820499A EP2741214A1 EP 2741214 A1 EP2741214 A1 EP 2741214A1 EP 12820499 A EP12820499 A EP 12820499A EP 2741214 A1 EP2741214 A1 EP 2741214A1
Authority
EP
European Patent Office
Prior art keywords
security information
storage device
information storage
unlock
data storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP12820499.7A
Other languages
German (de)
English (en)
Other versions
EP2741214B1 (fr
EP2741214A4 (fr
Inventor
Wei Zhao
Jingwen Xu
Feng Shi
Yang Gao
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Publication of EP2741214A1 publication Critical patent/EP2741214A1/fr
Publication of EP2741214A4 publication Critical patent/EP2741214A4/fr
Application granted granted Critical
Publication of EP2741214B1 publication Critical patent/EP2741214B1/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2147Locking files

Definitions

  • the present invention relates to a data storage system and method, and more particularly, to a data storage system and method used for the security information interaction.
  • the existing security data storage systems include the following two implementation approach: (1) both a user password and an unlock password are used in the security data storage system (including a security data storage device), said user password is used for authenticating the identity of the user of the security data storage device, and said unlock password is used for unlocking the security data storage device (when the number of times that the error user passwords are entered continuously reach a predetermined number of times, said security data storage device is locked automatically), so as to cause said user password to recovery to an initial state, wherein, the user password of said security data storage device is initialized by the manufacturer and can be reset by the user, whereas the unlock passwords are all the same (for example, the USBKeys belonging to the same batch have the same unlock passwords); (2) the initialization and reset of the user password are not supported (for example, the PIN code is not
  • the first implementation approach described above has the following problems: due to the unlock passwords are all the same, once the unlock password has been divulged, then any security data storage device can be unlocked, thus there exist largely potential security risks.
  • the second implementation approach described above has the following problems: the use cost of the user increases (for example, once the security data storage device is locked, a new security data storage device needs to be used), and the complexity of use is significantly increased (for example, to re-download new security information data).
  • the present invention proposes a data storage system and method used for the security information interaction.
  • said original parameters are at least one factor being capable of uniquely identifying said security information storage device.
  • said original parameters are the identifier of said security information storage device.
  • said data information related to the security information interaction include an unlock password, a user password and business authentication data.
  • said security information storage device further comprises:
  • said security information storage device further comprises an information reset module.
  • Said information reset module is used to initialize the predetermined items in said data information related to the security information interaction when said security information storage device is unlocked.
  • said data communication interface is a USB interface.
  • said unlock password generating device further comprises:
  • said first dynamic link library is set by a service provider or the relevant third party.
  • said unlock server further comprises:
  • said second dynamic link library is set by the manufacturer of said security information storage device.
  • said security information storage device is a USBKey.
  • said original parameters are at least one factor being capable of uniquely identifying said security information storage device.
  • said original parameters are the identifier of said security information storage device.
  • said security information is business authentication data.
  • said data storage method used for the security information interaction further comprises:
  • said step (A2) further comprises: initializing predetermined items when said security information storage device is unlocked.
  • said data communication interface is a USB interface.
  • said step (A1) further comprises:
  • said first dynamic link library is set by a service provider or the relevant third party.
  • said step (A2) further comprises:
  • said second dynamic link library is set by the manufacturer of said security information storage device.
  • said security information storage device is a USBKey.
  • the data storage system and method used for the security information interaction disclosed in the present invention have the following advantages: (1) since different security information storage devices have different unlock passwords, the potential security risks due to the divulgement of the unlock passwords are reduced; (2) the complexity of the unlock process is reduced, and the maintain cost of the user for the security information storage device is reduced at the same time; (3) since said first dynamic link library and said second dynamic link library are set by different providers, the details (e.g., which key algorithm is adopted) of generating and writing the unlock password are not visible to the external, thereby further reducing the potential security risks existed in the generating and writing process of the unlock password on the whole.
  • FIG. 1 is a schematic structure diagram of the data storage system used for the security information interaction according to the embodiment of the present invention.
  • the data storage system used for the security information interaction disclosed in the present invention comprises a security information storage device 1, an unlock password generating device 2 and an unlock server 3.
  • Said security information storage device 1 is used to store and provide the data information related to the security information interaction.
  • Said unlock password generating device 2 is used to generate the unlock password corresponding to said security information storage device 1 based on the original parameters extracted from said security information storage device 1, and to write said unlock password into said security information storage device 1.
  • Said unlock server 3 is used to generate the unlock password corresponding to said security information storage device 1 based on the original parameters acquired from said security information storage device 1 when said security information storage device 1 is locked, and to use said unlock password to unlock said locked security information storage device 1.
  • said original parameters are at least one factor being capable of uniquely identifying said security information storage device 1.
  • said original parameters are the identifier (i.e., ID) of said security information storage device 1.
  • said data information related to the security information interaction include an unlock password, a user password and business authentication data (e.g. a digital certificate, a dynamic password or the like).
  • business authentication data e.g. a digital certificate, a dynamic password or the like.
  • said security information storage device 1 further comprises a data communication interface 5, an unlock password initialization module 6, an unlock module 7, a locking module 8 and a data storage module 9.
  • Said data communication interface 5 is used to complete the data communication with external devices.
  • Said unlock password initialization module 6 is used to provide the original parameters corresponding to said security information storage device 1 in response to an original parameters extracting request message from said unlock password generating device 2, and to store the generated unlock password from said unlock password generating device 2 into said data storage module 9.
  • Said unlock module 7 is used to provide the original parameters corresponding to said security information storage device 1 according to an original parameters extracting request message from said unlock server 3, and to unlock said security information storage device 1 based on the unlock password in the unlock request message from said unlock server 3.
  • Said locking module 8 is used to lock said security information storage device 1 when a predetermined condition is satisfied (exemplarily, said predetermined condition is that the number of times that the error user passwords are entered continuously reaches a predetermined number of times).
  • Said data storage module 9 is used to store said data information related to the security information interaction.
  • said security information storage device 1 further comprises an information reset module 15.
  • Said information reset module 15 is used to initialize the predetermined items in said data information related to the security information interaction when said security information storage device 1 is unlocked (exemplarily, said predetermined items are user passwords).
  • said data communication interface 5 is a USB interface.
  • said unlock password generating device 2 further comprises an original parameters extracting module 10 and a password generating module 11.
  • Said original parameters extracting module 10 is used to send said original parameters extracting request message to said security information storage device 1, and to transmit the original parameters acquired from said security information storage device 1 to said password generating module 11.
  • Said password generating module 11 is used to generate an unlock password corresponding to said security information storage device 1 based on said original parameters and by means of invoking a first dynamic link library (key algorithm dynamic link library DLL1), and to transmit the generated unlock password to said security information storage device 1.
  • said first dynamic link library is set by a service provider (e.g. a bank) or the relevant third party (i.e., said first dynamic link library is provided by a service provider or the relevant third party).
  • a service provider e.g. a bank
  • the relevant third party i.e., said first dynamic link library is provided by a service provider or the relevant third party.
  • said unlock server 3 further comprises an original parameters acquiring module 12, an unlock password generating module 13 and an unlock initiating module 14.
  • Said original parameters acquiring module 12 is used to send an original parameters extracting request message to said security information storage device 1, and to transmit the original parameters acquired from said security information storage device 1 to said unlock password generating module 13.
  • Said unlock password generating module 13 is used to generate an unlock password corresponding to said security information storage device 1 based on said original parameters and by means of invoking the second dynamic link library (an unlock dynamic link library DLL2), and to transmit the generated unlock password to said unlock initiating module 14.
  • Said unlock initiating module 14 is used to configure an unlock request message based on said generated unlock password, and to transmit said unlock request message to said security information storage device 1.
  • said second dynamic link library is set by the manufacturer of said security information storage device 1 (i.e., said second dynamic link library is provided by the manufacturer of said security information storage device 1).
  • said external devices include a user terminal 4, the unlock password generating device 2 and the unlock server 3.
  • said security information storage device 1 is a USBKey.
  • the basic operational principle of the data storage system used for the security information interaction disclosed in the present invention is as follows: the manufacturer of said security information storage device 1 invokes said first dynamic link library based on the original parameters extracted from said security information storage device 1 and by means of using the unlock password generating device 2, so as to generate an unlock password corresponding to said security information storage device 1, and to write said unlock password into said security information storage device 1; when said security information storage device 1 is locked (for example, the number of times that the error user passwords are entered continuously reaches a predetermined number of times), said unlock server 3 invokes said second dynamic link library based on the original parameters acquired from said security information storage device 1, so as to generate an unlock password corresponding to said security information storage device 1, and to use said unlock password to unlock said locked security information storage device 1; when said security information storage device 1 is in a non-locked state, said security information storage device 1 can communicate with said user terminal 4 via said data communication interface 5, so as to complete the interaction of the security information related to businesses (for example, the authentication of the security data
  • FIG. 2 is a flow diagram of the data storage method used for the security information interaction according to the embodiment of the present invention.
  • the data storage method used for the security information interaction disclosed in the present invention comprises the following steps: (A1) an unlock password generating device generating an unlock password corresponding to a security information storage device based on the original parameters extracted from said security information storage device, and writing said unlock password into said security information storage device; (A2) an unlock server generating an unlock password corresponding to said security information storage device based on the original parameters acquired from said security information storage device when said security information storage device is locked, and using said unlock password to unlock said locked security information storage device; (A3) said security information storage device communicating with a user terminal via a data communication interface when said security information storage device is in a non-locked state, so as to complete the interaction of the security information (for example, the authentication of the security data in the financial transaction).
  • said original parameters are at least one factor being capable of uniquely identifying said security information storage device.
  • said original parameters are the identifier (i.e., ID) of said security information storage device.
  • said security information is business authentication data (e.g. a digital certificate, a dynamic password or the like).
  • the data storage method used for the security information interaction disclosed in the present invention further comprises: (A4) locking said security information storage device when a predetermined condition is satisfied (exemplarily, said predetermined condition is that the number of times that the error user passwords are entered continuously reaches a predetermined number of times).
  • said step (A2) further comprises: initializing the predetermined items when said security information storage device is unlocked (exemplarily, said predetermined items are user passwords).
  • said data communication interface is a USB interface.
  • said step (A1) further comprises: (B1) sending an original parameters extracting request message to said security information storage device, so as to acquire the original parameters from said security information storage device; and (B2) generating an unlock password corresponding to said security information storage device based on said original parameters and by means of invoking the first dynamic link library (key algorithm dynamic link library DLL1), and transmitting the generated unlock password to said security information storage device.
  • B1 sending an original parameters extracting request message to said security information storage device, so as to acquire the original parameters from said security information storage device
  • B2 generating an unlock password corresponding to said security information storage device based on said original parameters and by means of invoking the first dynamic link library (key algorithm dynamic link library DLL1), and transmitting the generated unlock password to said security information storage device.
  • said first dynamic link library is set by a service provider (e.g. a bank) or the relevant third party (i.e., said first dynamic link library is provided by a service provider or the relevant third party).
  • a service provider e.g. a bank
  • the relevant third party i.e., said first dynamic link library is provided by a service provider or the relevant third party.
  • said step (A2) further comprises: (C1) sending an original parameters extracting request message to said security information storage device, so as to acquire the original parameters from said security information storage device; (C2) generating an unlock password corresponding to said security information storage device based on said original parameters and by means of invoking the second dynamic link library (an unlock dynamic link library DLL2); and (C3) configuring an unlock request message based on the generated unlock password, and transmitting said unlock request message to said security information storage device.
  • said second dynamic link library is set by the manufacturer of said security information storage device (i.e., said second dynamic link library is provided by the manufacturer of said security information storage device 1).
  • said security information storage device is a USBKey.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
EP12820499.7A 2011-08-02 2012-08-02 Système de mémorisation de données et procédé pour l'interaction d'informations de sécurité Active EP2741214B1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2011102200507A CN102915414A (zh) 2011-08-02 2011-08-02 用于安全性信息交互的数据存储系统及方法
PCT/CN2012/079562 WO2013017093A1 (fr) 2011-08-02 2012-08-02 Système de mémorisation de données et procédé pour l'interaction d'informations de sécurité

Publications (3)

Publication Number Publication Date
EP2741214A1 true EP2741214A1 (fr) 2014-06-11
EP2741214A4 EP2741214A4 (fr) 2015-03-11
EP2741214B1 EP2741214B1 (fr) 2020-09-23

Family

ID=47613777

Family Applications (1)

Application Number Title Priority Date Filing Date
EP12820499.7A Active EP2741214B1 (fr) 2011-08-02 2012-08-02 Système de mémorisation de données et procédé pour l'interaction d'informations de sécurité

Country Status (5)

Country Link
US (1) US9705875B2 (fr)
EP (1) EP2741214B1 (fr)
JP (1) JP5860146B2 (fr)
CN (1) CN102915414A (fr)
WO (1) WO2013017093A1 (fr)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014143009A1 (fr) * 2013-03-15 2014-09-18 Intel Corporation Révocation de clé dans des dispositifs à système sur puce
CN104219196B (zh) * 2013-05-29 2018-12-18 腾讯科技(深圳)有限公司 业务锁定方法、业务解锁方法、装置及系统
CN104917763B (zh) * 2015-06-08 2018-04-27 飞天诚信科技股份有限公司 一种pin码缓存方法
US10382201B1 (en) * 2015-09-22 2019-08-13 Seagate Technology Llc Removable circuit for unlocking self-encrypting data storage devices
US10460110B1 (en) 2017-02-17 2019-10-29 Seagate Technology Llc Systems and methods for unlocking self-encrypting data storage devices
US10678953B1 (en) 2017-04-26 2020-06-09 Seagate Technology Llc Self-contained key management device
US10855451B1 (en) 2017-08-02 2020-12-01 Seagate Technology Llc Removable circuit for unlocking self-encrypting data storage devices
US11120151B1 (en) 2017-08-02 2021-09-14 Seagate Technology Llc Systems and methods for unlocking self-encrypting data storage devices
US10812267B2 (en) * 2018-11-05 2020-10-20 International Business Machines Corporation Secure password lock and recovery
CN117668936B (zh) * 2024-01-31 2024-07-09 荣耀终端有限公司 数据处理方法及相关装置

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3964771B2 (ja) 2002-10-11 2007-08-22 株式会社豊田中央研究所 路面状態推定装置、及び該装置を備えた車両の運動制御装置
JP4170723B2 (ja) 2002-10-23 2008-10-22 大日本印刷株式会社 ロック解除方法およびシステム
US8065717B2 (en) * 2002-11-27 2011-11-22 Activcard Automated security token administrative services
CN100504818C (zh) * 2003-07-07 2009-06-24 巨视股份有限公司 调控对非易失性存储区访问的方法和判定访问的自动方法
WO2005059727A1 (fr) * 2003-12-17 2005-06-30 Matsushita Electric Industrial Co., Ltd. Procedes et appareils permettant de distribuer un groupe de parametres systeme secrets et un groupe de cles intermediaires cryptees afin de generer des cles de cryptage et decryptage de contenu
US7546587B2 (en) * 2004-03-01 2009-06-09 Microsoft Corporation Run-time call stack verification
US7552341B2 (en) * 2004-09-01 2009-06-23 Microsoft Corporation Licensing the use of software on a particular CPU
KR20070100297A (ko) * 2004-12-20 2007-10-10 코닌클리케 필립스 일렉트로닉스 엔.브이. 보호된 휴대용 저장 매체의 잠금해제
US20060176146A1 (en) * 2005-02-09 2006-08-10 Baldev Krishan Wireless universal serial bus memory key with fingerprint authentication
US7758422B2 (en) * 2005-04-13 2010-07-20 Microsoft Corporation Hard drive authentication
JP2007249507A (ja) 2006-03-15 2007-09-27 Hitachi Software Eng Co Ltd 情報漏洩防止方法、情報漏洩防止システム及び情報端末
EP1965342A1 (fr) * 2007-02-27 2008-09-03 Nagracard S.A. Procédé pour effectuer une transaction entre un module de paiement et un module de sécurité
US8832453B2 (en) * 2007-02-28 2014-09-09 Red Hat, Inc. Token recycling
JP4867760B2 (ja) * 2007-03-30 2012-02-01 ソニー株式会社 情報処理装置および方法、並びに情報処理システム
CN101796525A (zh) * 2007-08-28 2010-08-04 松下电器产业株式会社 电子设备、解锁方法和程序
US8219803B2 (en) * 2008-10-20 2012-07-10 Disney Enterprises, Inc. System and method for unlocking content associated with media
US9112702B2 (en) * 2009-04-29 2015-08-18 Microsoft Technology Licensing, Llc Alternate authentication
US8670748B2 (en) * 2009-05-01 2014-03-11 Apple Inc. Remotely locating and commanding a mobile device
CN102082785A (zh) * 2010-11-24 2011-06-01 蓝帽子(厦门)文化传播有限公司 线上线下游戏数据交互传输的认证加密装置及其认证方法

Also Published As

Publication number Publication date
JP2014522047A (ja) 2014-08-28
US20140237569A1 (en) 2014-08-21
WO2013017093A1 (fr) 2013-02-07
EP2741214B1 (fr) 2020-09-23
JP5860146B2 (ja) 2016-02-16
US9705875B2 (en) 2017-07-11
CN102915414A (zh) 2013-02-06
EP2741214A4 (fr) 2015-03-11

Similar Documents

Publication Publication Date Title
EP2741214A1 (fr) Système de mémorisation de données et procédé pour l'interaction d'informations de sécurité
US11683187B2 (en) User authentication with self-signed certificate and identity verification and migration
US9930040B2 (en) System and method for provisioning a security token
BRPI0722174A2 (pt) Método e sistema para autenticar usuários em um sistema de processamento de dados.
CN114868123A (zh) 非接触式卡个人标识系统
US10594685B2 (en) User selected key authentication
CN107113613B (zh) 服务器、移动终端、网络实名认证系统及方法
EP2894891A2 (fr) Jeton mobile
CN101582886A (zh) 基于动态口令进行身份认证的方法和系统
US7761468B2 (en) Supporting multiple security mechanisms in a database driver
CN109033848A (zh) 存储数据安全运行方法及系统
CN101714920A (zh) 集中多服务帐号的权限管理系统及其方法
EP3343494A1 (fr) Signature électronique de transactions entre des utilisateurs et des fournisseurs distants par l'utilisation de codes bidimensionnels
Sanchez‐Reillo et al. Developing standardised network‐based biometric services
Pernpruner et al. The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis
Gurav et al. Remote client authentication using mobile phone generated OTP
CN110782193A (zh) 用于管理对象配送的方法、设备和计算机可读介质
WO2018017019A1 (fr) Dispositif et procédé de sécurité personnelle
CN103457730A (zh) 安全性信息交互装置及方法和用于安全性信息交互的ic卡
CN115271689A (zh) 数字资产找回的方法及相关设备
Tschofenig Web Cryptography: Supporting the FIDO Protocol Family

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20140122

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20150206

RIC1 Information provided on ipc code assigned before grant

Ipc: G06F 21/31 20130101ALI20150202BHEP

Ipc: G06F 21/78 20130101ALI20150202BHEP

Ipc: G06F 12/14 20060101AFI20150202BHEP

Ipc: G06F 21/34 20130101ALI20150202BHEP

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20161209

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 602012072491

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: G06F0012140000

Ipc: G06F0021300000

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

RIC1 Information provided on ipc code assigned before grant

Ipc: G06F 21/78 20130101ALI20200430BHEP

Ipc: G06F 21/31 20130101ALI20200430BHEP

Ipc: G06F 12/14 20060101ALI20200430BHEP

Ipc: H04L 29/06 20060101ALI20200430BHEP

Ipc: G06F 21/34 20130101ALI20200430BHEP

Ipc: G06F 21/30 20130101AFI20200430BHEP

INTG Intention to grant announced

Effective date: 20200518

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602012072491

Country of ref document: DE

Ref country code: AT

Ref legal event code: REF

Ref document number: 1317106

Country of ref document: AT

Kind code of ref document: T

Effective date: 20201015

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201224

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201223

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201223

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1317106

Country of ref document: AT

Kind code of ref document: T

Effective date: 20200923

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20200923

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210125

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210123

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602012072491

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

26N No opposition filed

Effective date: 20210624

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20210831

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210831

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210831

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210802

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210802

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210831

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20120802

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20240627

Year of fee payment: 13

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20240625

Year of fee payment: 13

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20240702

Year of fee payment: 13